This report delves into the realm of ethical hacking and penetration testing, providing a comprehensive overview of key concepts and methodologies. It begins by defining the purpose of penetration testing, which is to simulate real-world attack scenarios to identify security vulnerabilities before malicious actors exploit them. The report then differentiates between white box and black box testing approaches, highlighting their respective strengths and applications. It further explores the critical aspect of password cracking, explaining the process of recovering and guessing passwords, and introduces John the Ripper as a prominent password cracking tool. The importance of hashing in securing passwords and data integrity is also discussed. The report offers insights into the tools and skills used by ethical hackers and penetration testers, and the overall goal is to enhance the security infrastructure of an organization by identifying and mitigating vulnerabilities. References to relevant literature are provided to support the findings.